Hi,

You say you can't ping through pix. I imagine you mean from a PC on the
inside network to the internet address on the outside network. Did you check
your xlate table if it's doing the translation? (ie. show xlate). I also
notice that you have a VPN, make sure that the address you ping isn't in the
subnet that you define for the VPN nat0 and for interesting traffic.

Looking at your ping results, it looks like you can ping hosts in the inside
and outside interfaces. So you just have to figure out why your pix is
stopping your traffic.

Albert

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Tunji Suleiman
Sent: Thursday, February 20, 2003 4:27 PM
To: [EMAIL PROTECTED]
Subject: Traffic thru PIX [7:63347]


Hello All,

Can someone pls tell me how I can allow pings and other traffic thru the
PIX? I've added both access-list and conduits for testing. Can ping from pix
to a test PC on LAN, to Internet router and to UUNet DNS but not from test
PC thru PIX as per below:

PIX# wr t
Building configuration...
: Saved
:
PIX Version 6.1(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password J470/UhJVN.5DRKT encrypted
passwd J470/UhJVN.5DRKT encrypted
hostname PIX
domain-name pixdomain.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
name 10.250.77.3 testpc
name 66.120.182.121 gateway
access-list nat0 permit ip 10.250.77.0 255.255.255.0 10.250.0.0 255.255.0.0
access-list nat0 permit ip 10.250.77.0 255.255.255.0 10.249.0.0 255.255.0.0
access-list oxfordhub permit ip 10.250.77.0 255.255.255.0 10.250.4.0
255.255.255
.0
access-list oxfordhub permit ip 10.250.77.0 255.255.255.0 10.249.48.0
255.255.24
0.0
access-list ipalcohub permit ip 10.250.77.0 255.255.255.0 10.250.3.0
255.255.255
.0
access-list ipalcohub permit ip 10.250.77.0 255.255.255.0 10.249.32.0
255.255.24
0.0
access-list arlhub permit ip 10.250.77.0 255.255.255.0 10.250.0.0
255.255.255.0
access-list arlhub permit ip 10.250.77.0 255.255.255.0 10.249.64.0
255.255.240.0

access-list arlington permit ip 10.250.77.0 255.255.255.0 10.250.2.0
255.255.255
.0
access-list arlington permit ip 10.250.77.0 255.255.255.0 10.249.16.0
255.255.24
0.0
access-list richmond permit ip 10.250.77.0 255.255.255.0 10.250.75.0
255.255.255
.0
access-list aclout permit icmp any any
pager lines 24
logging console debugging
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 66.120.182.122 255.255.255.248
ip address inside 10.250.77.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 66.120.182.123 netmask 255.255.255.248
nat (inside) 0 access-list nat0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group aclout in interface outside
conduit permit icmp any any
conduit permit tcp any any
route outside 0.0.0.0 0.0.0.0 gateway 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323
0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 10.250.78.3 255.255.255.255 inside
http 10.250.77.2 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set strong3 esp-3des esp-sha-hmac
crypto map cmap 1 ipsec-isakmp
crypto map cmap 1 match address oxfordhub
crypto map cmap 1 set peer 217.33.153.3
crypto map cmap 1 set transform-set strong3
crypto map cmap 2 ipsec-isakmp
crypto map cmap 2 match address ipalcohub
crypto map cmap 2 set peer 216.37.39.66
crypto map cmap 2 set transform-set strong3
crypto map cmap 3 ipsec-isakmp
crypto map cmap 3 match address arlhub
crypto map cmap 3 set peer 206.154.225.2
crypto map cmap 3 set transform-set strong3
crypto map cmap 4 ipsec-isakmp
crypto map cmap 4 match address arlington
crypto map cmap 4 set peer 65.204.31.2
crypto map cmap 4 set transform-set strong3
crypto map cmap 5 ipsec-isakmp
crypto map cmap 5 match address richmond
crypto map cmap 5 set peer 195.172.96.66
crypto map cmap 5 set transform-set strong3
crypto map cmap interface outside
isakmp enable outside
isakmp key ******** address 217.33.153.3 netmask 255.255.255.255
isakmp key ******** address 216.37.39.66 netmask 255.255.255.255
isakmp key ******** address 208.171.213.2 netmask 255.255.255.255
isakmp key ******** address 65.204.31.2 netmask 255.255.255.255
isakmp key ******** address 195.172.96.66 netmask 255.255.255.255
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 1
isakmp policy 10 lifetime 3600
telnet 10.250.77.0 255.255.255.0 inside
telnet timeout 60
ssh timeout 5
terminal width 80
Cryptochecksum:91a83ee76d6bfefd0155f5f7f2181f6c
: end
[OK]
PIX#
PIX# ping gateway
     gateway response received -- 0ms
     gateway response received -- 0ms
     gateway response received -- 0ms
PIX# ping 198.6.1.1
     198.6.1.1 response received -- 650ms
     198.6.1.1 response received -- 660ms
     198.6.1.1 response received -- 640ms
PIX# ping 198.6.1.1
     198.6.1.1 response received -- 700ms
     198.6.1.1 response received -- 640ms
     198.6.1.1 response received -- 640ms
PIX# ping testpc
     testpc response received -- 0ms
     testpc response received -- 0ms
     testpc response received -- 0ms
PIX#

TIA.








_________________________________________________________________
Protect your PC - get McAfee.com VirusScan Online
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=63410&t=63347
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to